{"id":15063,"date":"2023-05-10T09:00:23","date_gmt":"2023-05-10T07:00:23","guid":{"rendered":"https:\/\/www.topdesk.com\/da\/?p=15063"},"modified":"2025-01-09T13:07:27","modified_gmt":"2025-01-09T12:07:27","slug":"sikkerhedsrisici-ved-byod","status":"publish","type":"post","link":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/","title":{"rendered":"De 5 st\u00f8rste sikkerhedsrisici ved BYOD"},"content":{"rendered":"<p><strong>Fremkomsten af fjernarbejde betyder, at flere og flere mennesker v\u00e6lger at bruge deres personlige b\u00e6rbare computere, telefoner og tablets til arbejdet. For medarbejderne betyder det mere frihed og fleksibilitet. Men for it-afdelingerne kan BYOD (bring your own device) let blive til et cybersikkerhedsmareridt.<\/strong><\/p>\n<h2>5 ting du skal v\u00e6re opm\u00e6rksom p\u00e5 ved BYOD<\/h2>\n<p>Der er flere ting, som du skal have styr p\u00e5, hvis dine medarbejder anvender deres egne enheder. Her er nogle af de mest centrale.<\/p>\n<h3>1. Databrud<\/h3>\n<p>BYOD-enheder &#8211; is\u00e6r mobile enheder &#8211; komplicerer enhver it-sikkerhedsstrategi. De er ofte lettere for medarbejderne at miste og er normalt ikke s\u00e5 godt beskyttet mod sikkerhedstrusler som virksomhedsejede enheder.<\/p>\n<p>Da BYOD-enheder normalt indeholder en blanding af personlige og forretningsm\u00e6ssige data, er de desuden vanskeligere for it-afdelingen at sikre og fjernstyre, hvis noget g\u00e5r galt.<\/p>\n<p>Hybridarbejde har f\u00f8rt til en stigning i antallet af databrud &#8211; og ikke mindst en del <a href=\"https:\/\/www.topdesk.com\/da\/blog\/cybersikkerhedsrisici-ved-fjernarbejde\/\">cybersikkerhedsmareridt.<\/a><\/p>\n<h3>2. Usikre netv\u00e6rk<\/h3>\n<p>P\u00e5 grund af den fleksibilitet, de tilbyder, anvender medarbejderne ofte BYOD-enheder p\u00e5 farten &#8211; det er en af hoved\u00e5rsagerne til, at mange mennesker v\u00e6lger BYOD i f\u00f8rste omgang. Og det offentlige Wi-Fi i caf\u00e9en er ret praktisk, hvis du har lyst til en cappuccino, mens du arbejder. Men hvis du opretter forbindelse til et usikkert Wi-Fi-netv\u00e6rk, er v\u00e6rdifulde virksomhedsdata i fare. N\u00e5r medarbejdere opretter forbindelse til offentlige Wi-Fi-netv\u00e6rk, bliver deres arbejdsenhed s\u00e5rbar over for angreb som f.eks:<\/p>\n<ul>\n<li><em>Honeypots<\/em>: Falske Wi-Fi-hotspots, der er oprettet af hackere, og som ser legitime ud for slutbrugerne.<\/li>\n<li><em>Snage<\/em>: Hackere lytter til netv\u00e6rkstrafikken mellem to maskiner, hvilket potentielt kan eksponere fortrolige data for personer uden for organisationen.<\/li>\n<\/ul>\n<p>N\u00e5r man udarbejder en BYOD-politik, er det afg\u00f8rende at tage hensyn til disse &#8220;tredje rum&#8221; s\u00e5som caf\u00e9er &#8211; og deres usikre netv\u00e6rk.<\/p>\n<h3>3. Sl\u00f8rede linjer<\/h3>\n<p>Uklare sikkerhedsforventninger er i forvejen d\u00e5rlige nyheder for enhver it-afdeling. Men hvis du kombinerer dem med BYOD, har du et potentielt sikkerhedsmareridt p\u00e5 h\u00e6nderne.<\/p>\n<p>Hvorfor?<\/p>\n<p>Jo, hvis en medarbejder anvender en personlig enhed p\u00e5 arbejdet, betyder det, at han\/hun sandsynligvis ogs\u00e5 anvender den, n\u00e5r arbejdsdagen slutter. Desv\u00e6rre betyder det, at de er mindre tilb\u00f8jelige til at overholde anviste best practices inden for it-sikkerhed.<\/p>\n<p>N\u00e5r alt kommer til alt, anvender du sandsynligvis ikke den samme forsigtighed, n\u00e5r du anvender din egen b\u00e6rbare computer i fritiden, som du g\u00f8r, n\u00e5r du anvender en enhed p\u00e5 arbejdet. Men fordi den personlige enhed ogs\u00e5 bruges p\u00e5 arbejdet, er der risiko for at eksponere fortrolige virksomhedsdata. Derfor er det ekstra vigtigt at opstille klare sikkerhedsforventninger for medarbejdere, der arbejder p\u00e5 deres egne enheder.<\/p>\n<h3>4. Shadow IT<\/h3>\n<p>At anvende en personlig enhed til arbejdet som led i en BYOD-politik er \u00e9n ting, men at g\u00f8re det helt uden it-afdelingens viden er en anden ting. Det er her, at risikoen ved BYOD m\u00f8der det uhyggeligt navngivne f\u00e6nomen, <a href=\"https:\/\/www.topdesk.com\/da\/blog\/shadow-it\/\">Shadow IT<\/a>.<\/p>\n<p>Hvis medarbejderne anvender personlige enheder til arbejdet uden at underrette it-afdelingen, skaber det usynlige risici, som it-afdelingen ikke kan h\u00e5ndtere, fordi de ikke kender til dem. Det \u00f8ger ogs\u00e5 organisationens angrebsflade, hvilket g\u00f8r den mere modtagelig for ting som datal\u00e6kager.<\/p>\n<h2>5. Malware<\/h2>\n<p>En anden stor sikkerhedsrisiko ved BYOD-enheder &#8211; is\u00e6r smartphones &#8211; er, at de er mere s\u00e5rbare over for at blive inficeret med malware end andre enheder. Det er bekymrende, at dette ofte kan ske, uden at brugerne overhovedet opdager det. Det er ret almindeligt, at smartphone-brugere kommer til at downloade skadeligt software til deres enheder, hvilket kan g\u00f8re det muligt for hackere at stj\u00e6le data eller endda afinstallere sikkerhedsprogrammer.<\/p>\n<h2>Vil du v\u00e6re et skridt foran hackerne?<\/h2>\n<p>Med cyberangreb, der bliver mere og mere sofistikerede for hver dag, er det vigtigere end nogensinde f\u00f8r at have styr p\u00e5 it-sikkerheden. Det er derfor essentielt, at du booster din organisations it-<a href=\"https:\/\/https:\/\/www.topdesk.com\/da\/blog\/boost-din-organisations-it-sikkerhed\/\">sikkerhed<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fremkomsten af fjernarbejde betyder, at flere og flere mennesker v\u00e6lger at bruge deres personlige b\u00e6rbare computere, telefoner og tablets til arbejdet. For medarbejderne betyder det mere frihed og fleksibilitet. Men for it-afdelingerne kan BYOD (bring your own device) let blive til et cybersikkerhedsmareridt. 5 ting du skal v\u00e6re opm\u00e6rksom p\u00e5 ved BYOD Der er flere<\/p>\n","protected":false},"author":379,"featured_media":15066,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"editor_notices":[],"footnotes":""},"class_list":["post-15063","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":{"blog_author":17394,"blog_hubspot_cta_link":"","toc_display":"full","blog_promotion_overwrite":false,"blog_promotion":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>De 5 st\u00f8rste sikkerhedsrisici ved BYOD<\/title>\n<meta name=\"description\" content=\"Har du styr p\u00e5 it-sikkerheden i din organisation? Her er, hvad du skal v\u00e6re opm\u00e6rksom p\u00e5, hvis I har en BYOD-politik.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"De 5 st\u00f8rste sikkerhedsrisici ved BYOD\" \/>\n<meta property=\"og:description\" content=\"Har du styr p\u00e5 it-sikkerheden i din organisation? Her er, hvad du skal v\u00e6re opm\u00e6rksom p\u00e5, hvis I har en BYOD-politik.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/\" \/>\n<meta property=\"og:site_name\" content=\"T2 TOPdesk - DA\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TOPdesk\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-10T07:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-09T12:07:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Camille\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"De 5 st\u00f8rste sikkerhedsrisici ved BYOD | Bedre support, glade kunder | TOPdesk\" \/>\n<meta name=\"twitter:creator\" content=\"@topdesk\" \/>\n<meta name=\"twitter:site\" content=\"@topdesk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Camille\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/\"},\"author\":{\"name\":\"Camille\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/d5c66687e696681558408f7365411160\"},\"headline\":\"De 5 st\u00f8rste sikkerhedsrisici ved BYOD\",\"datePublished\":\"2023-05-10T07:00:23+00:00\",\"dateModified\":\"2025-01-09T12:07:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png\",\"articleSection\":[\"ITSM\",\"Sikkerhed\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/\",\"url\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/\",\"name\":\"De 5 st\u00f8rste sikkerhedsrisici ved BYOD\",\"isPartOf\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png\",\"datePublished\":\"2023-05-10T07:00:23+00:00\",\"dateModified\":\"2025-01-09T12:07:27+00:00\",\"description\":\"Har du styr p\u00e5 it-sikkerheden i din organisation? Her er, hvad du skal v\u00e6re opm\u00e6rksom p\u00e5, hvis I har en BYOD-politik.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#primaryimage\",\"url\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png\",\"contentUrl\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.topdesk.com\/da\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"De 5 st\u00f8rste sikkerhedsrisici ved BYOD\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#website\",\"url\":\"https:\/\/www.topdesk.com\/da\/\",\"name\":\"TOPdesk\",\"description\":\"Brugervenlig service management og ticketing software. TOPdesk hj\u00e6lper 4000+ virksomheder verden over med at supportere deres kunder. SaaS eller On-premise.\",\"publisher\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.topdesk.com\/da\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#organization\",\"name\":\"TOPdesk\",\"url\":\"https:\/\/www.topdesk.com\/da\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg\",\"contentUrl\":\"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg\",\"width\":1,\"height\":1,\"caption\":\"TOPdesk\"},\"image\":{\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TOPdesk\/\",\"https:\/\/x.com\/topdesk\",\"https:\/\/www.instagram.com\/topdeskuk\/\",\"https:\/\/www.linkedin.com\/company\/topdesk\/\",\"https:\/\/www.youtube.com\/user\/topdesk\",\"https:\/\/en.wikipedia.org\/wiki\/TOPdesk\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/d5c66687e696681558408f7365411160\",\"name\":\"Camille\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/536b583efa467323a58b4378dcc4db34502b8a97a3ce830f171429d920e09488?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/536b583efa467323a58b4378dcc4db34502b8a97a3ce830f171429d920e09488?s=96&d=mm&r=g\",\"caption\":\"Camille\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"De 5 st\u00f8rste sikkerhedsrisici ved BYOD","description":"Har du styr p\u00e5 it-sikkerheden i din organisation? Her er, hvad du skal v\u00e6re opm\u00e6rksom p\u00e5, hvis I har en BYOD-politik.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/","og_locale":"en_US","og_type":"article","og_title":"De 5 st\u00f8rste sikkerhedsrisici ved BYOD","og_description":"Har du styr p\u00e5 it-sikkerheden i din organisation? Her er, hvad du skal v\u00e6re opm\u00e6rksom p\u00e5, hvis I har en BYOD-politik.","og_url":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/","og_site_name":"T2 TOPdesk - DA","article_publisher":"https:\/\/www.facebook.com\/TOPdesk\/","article_published_time":"2023-05-10T07:00:23+00:00","article_modified_time":"2025-01-09T12:07:27+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png","type":"image\/png"}],"author":"Camille","twitter_card":"summary_large_image","twitter_title":"De 5 st\u00f8rste sikkerhedsrisici ved BYOD | Bedre support, glade kunder | TOPdesk","twitter_creator":"@topdesk","twitter_site":"@topdesk","twitter_misc":{"Written by":"Camille","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#article","isPartOf":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/"},"author":{"name":"Camille","@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/d5c66687e696681558408f7365411160"},"headline":"De 5 st\u00f8rste sikkerhedsrisici ved BYOD","datePublished":"2023-05-10T07:00:23+00:00","dateModified":"2025-01-09T12:07:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/"},"wordCount":659,"publisher":{"@id":"https:\/\/www.topdesk.com\/da\/#organization"},"image":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png","articleSection":["ITSM","Sikkerhed"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/","url":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/","name":"De 5 st\u00f8rste sikkerhedsrisici ved BYOD","isPartOf":{"@id":"https:\/\/www.topdesk.com\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#primaryimage"},"image":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#primaryimage"},"thumbnailUrl":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png","datePublished":"2023-05-10T07:00:23+00:00","dateModified":"2025-01-09T12:07:27+00:00","description":"Har du styr p\u00e5 it-sikkerheden i din organisation? Her er, hvad du skal v\u00e6re opm\u00e6rksom p\u00e5, hvis I har en BYOD-politik.","breadcrumb":{"@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#primaryimage","url":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png","contentUrl":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/de-5-stoerste-sikkerhedsrisici-ved-BYOD.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.topdesk.com\/da\/blog\/sikkerhedsrisici-ved-byod\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.topdesk.com\/da\/"},{"@type":"ListItem","position":2,"name":"De 5 st\u00f8rste sikkerhedsrisici ved BYOD"}]},{"@type":"WebSite","@id":"https:\/\/www.topdesk.com\/da\/#website","url":"https:\/\/www.topdesk.com\/da\/","name":"TOPdesk","description":"Brugervenlig service management og ticketing software. TOPdesk hj\u00e6lper 4000+ virksomheder verden over med at supportere deres kunder. SaaS eller On-premise.","publisher":{"@id":"https:\/\/www.topdesk.com\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.topdesk.com\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.topdesk.com\/da\/#organization","name":"TOPdesk","url":"https:\/\/www.topdesk.com\/da\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/logo\/image\/","url":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg","contentUrl":"https:\/\/www.topdesk.com\/da\/wp-content\/media\/sites\/43\/TOPdesk_RGB_Logo.svg","width":1,"height":1,"caption":"TOPdesk"},"image":{"@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TOPdesk\/","https:\/\/x.com\/topdesk","https:\/\/www.instagram.com\/topdeskuk\/","https:\/\/www.linkedin.com\/company\/topdesk\/","https:\/\/www.youtube.com\/user\/topdesk","https:\/\/en.wikipedia.org\/wiki\/TOPdesk"]},{"@type":"Person","@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/d5c66687e696681558408f7365411160","name":"Camille","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.topdesk.com\/da\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/536b583efa467323a58b4378dcc4db34502b8a97a3ce830f171429d920e09488?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/536b583efa467323a58b4378dcc4db34502b8a97a3ce830f171429d920e09488?s=96&d=mm&r=g","caption":"Camille"}}]}},"_links":{"self":[{"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/posts\/15063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/users\/379"}],"replies":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/comments?post=15063"}],"version-history":[{"count":8,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/posts\/15063\/revisions"}],"predecessor-version":[{"id":25500,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/posts\/15063\/revisions\/25500"}],"acf:post":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/person\/17394"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/media\/15066"}],"wp:attachment":[{"href":"https:\/\/www.topdesk.com\/da\/wp-json\/wp\/v2\/media?parent=15063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}